Conferences related to Computer viruses

Back to Top

2011 3rd International Workshop on Education Technology and Computer Science (ETCS)

ETCS2011 will be held on 12-13 March, 2011 in Wuhan, China. ETCS2009 and ETCS2010 have been indexed by EI Compendex and ISTP. The ETCS2011 will bring together the top researchers from Asian Pacific nations, North America, Europe and around the world to exchange their research results and address open issues in Education Technology and Computer Science.

  • 2010 2nd International Workshop on Education Technology and Computer Science (ETCS)

    The 2nd International Workshop on Education Technology and Computer Science (ETCS2010) will be held on 6-7 March, 2010 in Wuhan, China. The workshop will bring together the top researchers from Asian Pacific nations, North America, Europe and around the world to exchange their research results and address open issues in Education Technology and Computer Science.

  • 2009 First International Workshop on Education Technology and Computer Science (ETCS)

    ETCS2009 is organized by Huazhong Universiy of Science and Technology, Harbin Institute of Technology,and supported by IEEE Harbin Section, Huazhong Normal University,Wuhan University. ETCS 2009 will be convened in the magnificent cultural city - Wuhan, China. ETCS 2009 will bring experts from several continents to give presentations, exchange information and learn about the latest developments in the field of education and computer science.


2010 Second International Conference on Computational Intelligence and Natural Computing (CINC)

The CINC 2010 conference provides a forum for engineers and scientists in academia, industry, and government to address profound issues including technical challenges, safety, social, legal, political, and economic issues, and to present and discuss their ideas, results, work in progress and experience on all aspects of computational intelligence and natural computing.



Periodicals related to Computer viruses

Back to Top

Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Information Theory, IEEE Transactions on

The fundamental nature of the communication process; storage, transmission and utilization of information; coding and decoding of digital and analog communication transmissions; study of random interference and information-bearing signals; and the development of information-theoretic techniques in diverse areas, including data communication and recording systems, communication networks, cryptography, detection systems, pattern recognition, learning, and automata.


Systems, Man, and Cybernetics, Part B, IEEE Transactions on

The scope of the IEEE Transactions on Systems, Man and Cybernetics Part B: Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or between machines, humans, and organizations. The scope of Part B includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, ...




Xplore Articles related to Computer viruses

Back to Top

Scalable Testing of Mobile Antivirus Applications

Andrea Valdi; Eros Lever; Simone Benefico; Davide Quarta; Stefano Zanero; Federico Maggi Computer, 2015

AndroTotal, a scalable antivirus evaluation system for mobile devices, creates reproducible, self-contained testing environments for each antivirus application and malware pair and stores them in a repository, benefiting both the research community and Android device users.


Optimal resiliency against mobile faults

H. Buhrman; J. A. Garay; J. -H. Hoepman Twenty-Fifth International Symposium on Fault-Tolerant Computing. Digest of Papers, 1995

We consider a model where malicious agents can corrupt hosts and move around in a network of processors. We consider a family of mobile fault models MF(t/n-1,/spl rho/). In MF(t/n-1,/spl rho/) there are a total of n processors, the maximum number of mobile faults is t, and their roaming pace is /spl rho/ (for example, /spl rho/=3 means that it ...


Most known vulnerabilities in Saudi Arabian web servers

Khaled S. Alghathbar; Maqsood Mahmud; Hanif Ullah 2008 4th IEEE/IFIP International Conference on Central Asia on Internet, 2008

Vulnerabilities are the loopholes that arise due to poor programming or mis- configuration. Web Applications are considered to be very vulnerable to attack as compared to desktop programs on sole computers. Keeping this thing in our minds we decided to find out the all possible vulnerabilities in Saudi Arabian organizationpsilas Web servers. To assess these vulnerabilities we selected number of ...


The method of P2P traffic detecting for P2P harmful contents prevention

Ho Gyun Lee; Taek yong Nam; Jong Soo Jang The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005., 2005

Conventionally, a main interest in a computer security has been focused on protection of a computer system itself, i.e., protection against viruses or system attacks such as denial of service attacks (DoS attack), or communication encryption used for cash transfer service at a bank. However, with regard to influence given by exchanging contents to human beings, a research on automatic ...


Research on Active Defence Technology with Virus Based on K-Nearest Neighbor Algorithm of Kernel

Xuedou Yu 2009 International Conference on Environmental Science and Information Application Technology, 2009

In this paper, the active defence technology against virus, the detection technology of known variants of virus and the active defence technology against virus based on K-NN are introduced. Their disadvantages are analyzed. A solution which is based on k-nearest neighbor algorithm of kernel and the active defence technology against virus is proposed. The solution can distinguish safe process from ...


More Xplore Articles

Educational Resources on Computer viruses

Back to Top

eLearning

Scalable Testing of Mobile Antivirus Applications

Andrea Valdi; Eros Lever; Simone Benefico; Davide Quarta; Stefano Zanero; Federico Maggi Computer, 2015

AndroTotal, a scalable antivirus evaluation system for mobile devices, creates reproducible, self-contained testing environments for each antivirus application and malware pair and stores them in a repository, benefiting both the research community and Android device users.


Optimal resiliency against mobile faults

H. Buhrman; J. A. Garay; J. -H. Hoepman Twenty-Fifth International Symposium on Fault-Tolerant Computing. Digest of Papers, 1995

We consider a model where malicious agents can corrupt hosts and move around in a network of processors. We consider a family of mobile fault models MF(t/n-1,/spl rho/). In MF(t/n-1,/spl rho/) there are a total of n processors, the maximum number of mobile faults is t, and their roaming pace is /spl rho/ (for example, /spl rho/=3 means that it ...


Most known vulnerabilities in Saudi Arabian web servers

Khaled S. Alghathbar; Maqsood Mahmud; Hanif Ullah 2008 4th IEEE/IFIP International Conference on Central Asia on Internet, 2008

Vulnerabilities are the loopholes that arise due to poor programming or mis- configuration. Web Applications are considered to be very vulnerable to attack as compared to desktop programs on sole computers. Keeping this thing in our minds we decided to find out the all possible vulnerabilities in Saudi Arabian organizationpsilas Web servers. To assess these vulnerabilities we selected number of ...


The method of P2P traffic detecting for P2P harmful contents prevention

Ho Gyun Lee; Taek yong Nam; Jong Soo Jang The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005., 2005

Conventionally, a main interest in a computer security has been focused on protection of a computer system itself, i.e., protection against viruses or system attacks such as denial of service attacks (DoS attack), or communication encryption used for cash transfer service at a bank. However, with regard to influence given by exchanging contents to human beings, a research on automatic ...


Research on Active Defence Technology with Virus Based on K-Nearest Neighbor Algorithm of Kernel

Xuedou Yu 2009 International Conference on Environmental Science and Information Application Technology, 2009

In this paper, the active defence technology against virus, the detection technology of known variants of virus and the active defence technology against virus based on K-NN are introduced. Their disadvantages are analyzed. A solution which is based on k-nearest neighbor algorithm of kernel and the active defence technology against virus is proposed. The solution can distinguish safe process from ...


More eLearning Resources

IEEE-USA E-Books

  • Appendix B: Codes of Ethics

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Appendix C: Pointers to Additional Resources

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Index

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Computer Viruses as Artificial Life

    There has been considerable interest in computer viruses since they first appeared in 1981, and especially in the past few years as they have reached epidemic numbers in many personal computer environments. Viruses have been written about as a security problem, as a social problem, and as a possible means of performing useful tasks in a distributed computing environment. However, only recently have some scientists begun to ask if computer viruses are not a form of artificial life--a self-replicating organism. Simply because computer viruses do not exist as organic molecules may not be sufficient reason to dismiss the classification of this form of "vandalware" as a form of life. This paper begins with a description of how computer viruses operate and their history, and of the various ways computer viruses are structured. It then examines how viruses meet properties associated with life as defined by some researchers in the area of artificial life and self-organizing systems. The paper concludes with some comments directed toward the definition of artificially "alive" systems and experimentation.

  • About the Editor

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.



Standards related to Computer viruses

Back to Top

No standards are currently tagged "Computer viruses"


Jobs related to Computer viruses

Back to Top